Security News > 2020 > January

From 'Greta Thunberg' malware to Python 3, get yourself up to date with everything we've written since Christmas.

The Seagate Lyve Drive Mobile System is a portfolio of simple, secure, and efficient data management solutions built to activate the datasphere. "However, today's data management tools are too costly and inefficient for businesses to tap into data's full value. Lyve Drive is Seagate's first step toward a unified data experience, which will turn data's possibilities into tangible growth for the world's most critical industries."

Just keeping antivirus software up to date is not enough. If you are charged with taking care of your company's IT security, tune into our webcast starting at 3pm UK time on 15 January, 2020, to hear an expert at Helsinki-based security specialist F-Secure provide some valuable advice for SMEs.

Breaking into a website, or seizing its domain name and redirecting the domain, is rarely a long-lasting attack, but it usually causes embarrassment, and, at a technical level, highlights gaps in website security. Iran's online attack capabilities are well developed, and using hack attacks avoids bullet-and-missile exchanges against the U.S., with many experts noting that Iran would be unlikely to win such a fight.

Austria's foreign ministry has been targeted by a "Serious cyber attack", officials said, warning another country could be responsible. The attack, which began Saturday, was continuing on Sunday and "Experts say it could last several days," a foreign ministry spokesman told AFP. The interior and foreign ministries issued a statement about the attack which started shortly before 11.00 pm on Saturday.

The team at Tencent Keen Security Lab has done it again: hacking Tesla's Model S, in which the security shop's parent company has a significant stake. One Dell of a start to 2020 for RSA. It seems security company RSA's days as a part of the Dell family of brands may be numbered.

The popular UAE-developed mobile application ToTok has returned to the Google Play Store after it was removed on claims it was being used for government spying, the company said Saturday. Google and Apple removed the app from their online marketplaces last month after The New York Times reported ToTok allowed the UAE government to track the conversations, movements and other details of people who installed it on their phone.

One of the biggest challenges for CISOs is deciding an indemnity limit on cyber insurance, says Bhishma Maheshwari, executive vice president at insurance broker Marsh India. "A lot of times when we meet the CISOs ... their biggest challenge is how do we arrive at the limit of insurance to buy. Since it is essentially a contingent capital which you are buying, to arrive at the right kind of limit is very important," Maheshwari says in an interview with Information Security Media Group.

IT security product manufacturers are required to achieve government mandated, standards-based certifications to get their product in market. When it comes to cybersecurity product development, the industry is agile by design, but security product certification methods haven't kept pace with modern development methods and release cycles.

Here are five cyber risks that will endanger company data in 2020. To be sure, this threat category is uniquely nuanced, as things like intentional data theft, accidental sharing, and other data disclosure methodologies combine to create a robust threat that companies will need to address in 2020.